Significant service restrictions in the lending area from 17 March!

Showing 1 - 20 of 1,126

1

Traditional vs generative AI pentesting: a hands-on approach to hacking
Maleh, Yassine, VerfasserIn, (DE-588)1190215594, (DE-627)1668913240, aut ; Maleh, Yassine, VerfasserIn, (DE-588)1190215594, (DE-627)1668913240, aut
2026

Book
Save to List
2

PRWHA: RGB Image-Based Hybrid Attention for Cross-File SQLI/XSS Vulnerability Detection in PHP Web Applications.
Ren, Rong ; Song, Qingyu ; Zhang, Bing ; et al.
International Journal of Software Engineering & Knowledge Engineering. Mar2026, Vol. 36 Issue 3, p455-486. 32p.

PHP (Computer program la... PENETRATION testing (Com... IMAGE representation MACHINE learning DEEP learning
Academic journal
Save to List
3

Weaponizing language models for cybersecurity offensive operations: Automating vulnerability assessment report validation; A review paper.
Almuhaidib, Abdulrahman S. ; Zain, Azlan Mohd ; Zakaria, Zalmiyah ; et al.
AIP Conference Proceedings. 2026, Vol. 3406 Issue 1, p1-8. 8p.

LANGUAGE models PENETRATION testing (Com... AUTOMATION software CYBERSPACE operations (M... INTERNET security
Conference
Save to List
4

Hacker journeys: exploring paths in and out of illicit hacking through personal narratives.
Machande, Alina D. ; Joinson, Adam N. ; Smith, Laura G.E.
Behaviour & Information Technology. Dec2025, p1-18. 18p.

COMPUTER hacking INFORMATION technology s... COMPUTER crimes PENETRATION testing (Com... CRIMINOLOGICAL theory GAMIFICATION
Academic journal
Save to List
5

Intrusion detection in campus information systems through penetration tests.
Miftahuddin, Yusup ; Sholahuddin, Sholahuddin
AIP Conference Proceedings. 2025, Vol. 3351 Issue 1, p1-10. 10p.

INTRUSION detection syst... PENETRATION testing (Com... RANDOM forest algorithms INTERNET security MACHINE learning RISK assessment
Conference
Save to List
6

This AI Tool Can Plan and Execute Penetration Tests on Its Own.
Harvey, Grant ; Ofonagoro, Joseph Chisom ; Ticong, Liz ; et al.
eWeek. 12/31/2025, pN.PAG-N.PAG. 1p.

ARTIFICIAL intelligence COMPUTER software PENETRATION testing (Com... AUTOMATION software INTERNET security
Journal
Save to List
7

Research on the Application of Deep Reinforcement Learning in Automated Penetration Testing Path Optimization and Decision Making.
Wei Li ; Zixuan Zhao ; Youchen Shi ; et al.
International Journal for Housing Science & Its Applications. 2025, Vol. 47 Issue 1, p236-247. 22p.

REINFORCEMENT learning PENETRATION testing (Com... DECISION making
Academic journal
Save to List
8

A directed greybox fuzzer for windows applications.
Ren, Xin ; Wang, Peng-fei ; Zhou, Xu ; et al.
Scientific Reports. 7/8/2025, Vol. 15 Issue 1, p1-18. 18p.

PENETRATION testing (Com... COMPUTER software testin... APPLICATION software
Academic journal
Save to List
9

Design and implementation of an intelligent and secure vulnerability assessment framework.
Jaleel, Uruj ; Lalmawipuii, R.
AIP Conference Proceedings; 2026, Vol. 3345 Issue 1, p1-6, 6p

INTERNET of things MACHINE learning PENETRATION testing (Com... DATA integrity ARTIFICIAL intelligence KNOWLEDGE transfer
Conference
Save to List
10

Anthropic's AI tool sparks cybersecurity panic.
Pape, Carter
American Banker. 2/25/2026, pN.PAG-N.PAG. 1p.

ARTIFICIAL intelligence PENETRATION testing (Com... INTERNET security
Journal
Save to List
11

BGF-DR: bidirectional greybox fuzzing for DNS resolver vulnerability discovery.
Ying, Jie ; Li, Jun ; Chen, Ruoxi ; et al.
Computers & Security. Mar2026, Vol. 162, pN.PAG-N.PAG. 1p.

INTERNET domain naming s... PENETRATION testing (Com... COMPUTER software testin... DYNAMIC testing
Academic journal
Save to List
12

A unified modeling framework for automated penetration testing.
Wang, Yunfei ; Liu, Shixuan ; Wang, Wenhao ; et al.
Computers & Security. Mar2026, Vol. 162, pN.PAG-N.PAG. 1p.

SIMULATION methods & mod... SYSTEM integration COMPUTER network archite... PENETRATION testing (Com... TAXONOMY DYNAMIC simulation
Academic journal
Save to List
13

Statistical Analysis of Unique Web Application Vulnerabilities: A Quantitative Assessment of Scanning Tool Efficiency.
Zogaj, Gani ; Ismaili, Florie ; Idrizi, Ermira ; et al.
SEEU Review. Jun2025, Vol. 20 Issue 1, p136-152. 17p.

WEB-based user interface... PENETRATION testing (Com... STANDARD deviations INTERNET security STATISTICS
Academic journal
Save to List
14

МЕТОДИКА ВИКОНАННЯ ТЕСТІВ НА ПРОНИКНЕНН...
Яцків, В. В. ; Яцків, Н. Г. ; Возняк, С. І. ; et al.
Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì. 2025, Vol. 15 Issue 2, p288-296. 9p.

PENETRATION testing (Com... INTERNET security RESEARCH methodology SCHOLARLY method
Academic journal
Save to List
15

Des outils et des services pour détecter les failles avant les hackers.
MAUGER, CHARLOTTE
IT for Business. oct2025, Issue 2309, p48-49. 2p.

COMPUTER security vulner... PENETRATION testing (Com... INTERNET security
Journal
Save to List
16

Attacke auf Anforderung.
Martin, Guntermann
Der Handel. 10/23/2025, Issue 5, p12-13. 2p.

INFORMATION technology s... TEST methods COMPUTER security vulner... DATA corruption SMALL business CYBERTERRORISM
Journal
Save to List
17

One of the Best Hackers in the Country is an AI Bot.
Bass, Dina
Bloomberg.com. 6/24/2025, p29-29. 1p.

ARTIFICIAL intelligence COMPUTER security vulner... VENTURE capital SOFTWARE engineers PENETRATION testing (Com... INTERNET security
Journal
Save to List
18

Attack Chains Construction for Vehicular Networks Based on a Two‐Dimensional Vulnerability Combination Strategy.
Fang, Xiyu ; Yao, Xueqing ; Younas, Waleed ; et al.
International Journal of Communication Systems; 3/10/2026, Vol. 39 Issue 4, p1-16, 16p

INTELLIGENT transportati... COMBINATORIAL optimizati... VEHICULAR ad hoc network... PENETRATION testing (Com... CYBERTERRORISM INTERNET security
Academic journal
Save to List
19

Securing the Unseen: A Comprehensive Exploration Review of AI‐Powered Models for Zero‐Day Attack Detection.
Al Siam, Abdullah ; Faruqui, Nuruzzaman ; Azad, Akm ; et al.
Expert Systems; Mar2026, Vol. 43 Issue 3, p1-22, 22p

CONVOLUTIONAL neural net... REINFORCEMENT learning EVALUATION methodology ARTIFICIAL intelligence PENETRATION testing (Com... ARTIFICIAL neural networ...
Academic journal
Save to List
20

OSEL: boosting vulnerability detection with opcode slicing-enhanced feature learning.
Tong, Yanxiang ; Gao, Shengkai ; Zhang, Mingyue ; et al.
Software Quality Journal; Mar2026, Vol. 34 Issue 1, p1-37, 37p

DEEP learning BLOCKCHAINS PATTERN perception PENETRATION testing (Com... DATA analytics
Academic journal
Save to List

Filter